The SME space is changing, and emerging leaders are utilising affordable, flexible and scalable big data and analytics tools. SMEs are confident about their ability to innovate, but much less certain about their ability to use big data and advanced analytics to do so...

For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

Sophos warns of unofficial IE patch clash

Zert fix for VML flaw could cause more trouble than it solves

IT managers need to weigh up the pros and cons of using a third-party patch

Applying third-party patches to plug a gap before a vendor fixes its software
could cause more problems than it solves, a security vendor has warned.

"It may cause more conflicts further along the line because it is
unpredictable if people start going around patching themselves,"
Graham
Cluley, senior technology consultant at
Sophos, told
vnunet.com.

"When Microsoft does release a patch it doesn't want to have to deal with
lots of third-party patches and having to cater for those patches on those
computers," he said.

Cluley maintained that IT managers need to weigh up the pros and cons of
using a third-party patch themselves.

"It is not a decision that we as security vendors can make for you," he said.
"We can't say you should all go and get the
Zert
patch, because it will differ from place to place and individual to
individual."

Sophos understands that Microsoft is trying to release its own patch as soon
as it can so that users do not have to wait until the next patch cycle on 10
October.

"I think an early release would be sensible because we have seen a rise in
attempts to use this exploit, so it certainly is in the wild and hackers are
interested in exploiting it," Cluley said.

However, Cluley suggested that, if a firm's risk is so great that it would
rather rely on a third-party patch than leave the flaw open, it was "an
understandable concern".

"I happen to know some of the people behind Zert and I know they are
upstanding, decent, competent security people," he said.

"I would put things like the Zert patch in a slightly different camp from
just being emailed by someone out of the blue with an executable file."